Filters








287 Hits in 5.9 sec

Towards a Modernization Process for Secure Data Warehouses [chapter]

Carlos Blanco, Ricardo Pérez-Castillo, Arnulfo Hernández, Eduardo Fernández-Medina, Juan Trujillo
2009 Lecture Notes in Computer Science  
However, security constraints are not properly integrated in the complete DWs' development process, being traditionally considered in the last stages.  ...  Thus, we have proposed a model driven architecture (MDA) for secure DWs which takes into account security issues from the early stages of development and provides automatic transformations between models  ...  This research is part of the ESFINGE (TIN2006-15175-C05-05) Project financed by the Spanish Ministry of Education and Science, the QUASIMO-DO (PAC08-0157-0668) Project financed by the FEDER and the Regional  ... 
doi:10.1007/978-3-642-03730-6_3 fatcat:kcy7klzdyzg7xbcc4envkfwnz4

Applying QVT in Order to Implement Secure Data Warehouses in SQL Server Analysis Services

Carlos Blanco, Ignacio García Rodríguez de Guzmán, David G. Rosado, Eduardo Fernández-Medina, Juan Trujillo
2009 Journal of research and practice in information technology  
It is therefore highly important for OLAP tools to consider the security rules defined at early stages of the development lifecycle.  ...  By following the MDA approach we have created an architecture with which to develop secure Data Warehouses, and in this paper we complete this architecture, thus obtaining secure multidimensional code  ...  ACKNOWLEDGEMENTS This research is part of the ESFINGE (TIN2006-15175-C05-05) Project financed by the Spanish Ministry of Education and Science, and of the MISTICO (PBC-06-0082) and QUASIMODO (PAC08-0157  ... 
dblp:journals/acj/BlancoGRFT09 fatcat:mhiul5zqa5hqlcsplhpvkvp5xe

Transforming Conceptual Model into Logical Model for Temporal Data Warehouse Security: A Case Study

Marwa S, Mohamed E., Laila M., Yehia K.
2012 International Journal of Advanced Computer Science and Applications  
This paper proposes a set of rules to transform PIM model for secure temporal data warehouse (TDW) to PSM model, we apply the QVT language to the development of a secure data warehouse by means of a case  ...  In this paper, we are using the Model Driven Architecture (MDA) approach to represent logical model requirements for secure Temporal Data Warehouses (TDW).  ...  Our research efforts are thus applied to the development of secure DWs considering confidentiality issues during the whole development process, from an early development stage to the logical model.  ... 
doi:10.14569/ijacsa.2012.030320 fatcat:o3gamnxhwvhzblbc5bonmws7ci

Automatic Generation of Secure Multidimensional Code for Data Warehouses: An MDA Approach [chapter]

Carlos Blanco, Ignacio García-Rodríguez de Guzmán, Eduardo Fernández-Medina, Juan Trujillo, Mario Piattini
2008 Lecture Notes in Computer Science  
We have proposed an MDA architecture to develop secure Data Warehouses which allows them to be modeled at different abstraction levels (business, conceptual, logical and code level).  ...  We take into consideration security constraints in all models and we automatically transform models through QVT rules.  ...  An MDA approach for Secure DWs Our model driven (MDA) approach to develop secure DWs [12] considers security from the early stages of the development process and allows us to define security constraints  ... 
doi:10.1007/978-3-540-88873-4_9 fatcat:nh2u2f7rqvdoji5ao6tt7bqiom

Toward a New Approach for Modeling Dependability of Data Warehouse System [article]

I. Hilal, N. Afifi, R. Filali Hilali, M. Ouzzif
2013 arXiv   pre-print
In this paper, we first define the concepts related to dependability of DWS.  ...  Then we present our approach inspired from the MDA (Model Driven Architecture) approach to model dependability s aspects namely: availability, reliability, maintainability and security, taking into account  ...  Piattini, [8] proposed a security requirement model for DW based on the MDA approach [9] .  ... 
arXiv:1311.1181v1 fatcat:aql7jqmpbnhq5hix763wrbgdny

Development of Secure XML Data Warehouses with QVT

B. Vela, J.N. Mazón, C. Blanco, E. Fernández-Medina, J. Trujillo, E. Marcos
2013 Information and Software Technology  
Results: We have proposed an approach for the model driven development of Secure XML Data Warehouses, defining a set of QVT transformation rules.  ...  Unfortunately, although security issues have been considered in the development of traditional data warehouses, current research lacks approaches with which to consider security when the target platform  ...  This research has been carried out in the framework of the following pro  ... 
doi:10.1016/j.infsof.2013.03.003 fatcat:d3hdq22fk5ezdcwo5e2jqnja7m

An MDA approach for developing secure OLAP applications: Metamodels and transformations

Carlos Blanco, Guzmán de, Eduardo Fernández-Medina, Juan Trujillo
2015 Computer Science and Information Systems  
In previous work we defined a Model-Driven based approach for developing a secure DW repository by following a relational approach.  ...  Nevertheless, it is also important to define security constraints in the metadata layer that connects the DW repository with the OLAP tools; that is, over the same multidimensional structures that end  ...  This research is part of the following projects: SIGMA-CC (TIN2012-36904), GEODAS-BC (TIN2012-37493-C01) and GEODAS-BI (TIN2012-37493-C03) funded by the Ministerio de Economía y Competitividad and Fondo  ... 
doi:10.2298/csis140617007b fatcat:wz4qavnt2jdz7djcye3e3j3p6e

Towards Comprehensive Requirement Analysis for Data Warehouses: Considering Security Requirements

Emilio Soler, Veronika Stefanov, Jose-Norberto Mazon, Juan Trujillo, Eduardo Fernandez-Madina, Mario Piattini
2008 2008 Third International Conference on Availability, Reliability and Security  
Data warehouse (DW) systems integrate data from heterogeneous sources and are used by decision makers to analyze the status and the development of an organization.  ...  In this paper, we define the two kinds of requirements for data warehousing as information and quality-of-service requirements and combine them in a comprehensive approach based on MDA (Model Driven Architecture  ...  Therefore, we propose to perform requirements analysis for DWs as an essential stage of an overall approach for the development of DWs based on MDA, in which information and QoS requirements are modeled  ... 
doi:10.1109/ares.2008.86 dblp:conf/IEEEares/SolerSMTFP08 fatcat:h5pxlj3nzbcxjgsmuluqhofriu

An architecture for automatically developing secure OLAP applications from models

Carlos Blanco, Ignacio García-Rodríguez de Guzmán, Eduardo Fernández-Medina, Juan Trujillo
2015 Information and Software Technology  
to logical models, and from logical models to the secure implementation into a specific OLAP tool (SQL Server Analysis Services).  ...  Trujillo, An architecture for automatically developing Secure OLAP applications from models, Information and Software Technology (2014), doi: http://dx.defines and implements transformations from conceptual  ...  This research is part of the following projects: SERENIDAD (PEII11-037-7035) financed by the Viceconsejera de Ciencia y Tecnologa de la Junta de Comunidades de Castilla-La Mancha (Spain) and FEDER, and  ... 
doi:10.1016/j.infsof.2014.10.008 fatcat:e755rjwhwfcjljf3z3pkvkankq

A Model Driven Architecture Approach to Generate Multidimensional Schemas of Data Warehouses

Amine Azzaoui, Ouzayr Rabhi, Ayyoub Mani
2019 International Journal of Online and Biomedical Engineering (iJOE)  
Which is why, in this paper, we present a model-driven approach (MDA) for the design of data warehouses.  ...  To apply the MDA approach to the Data warehouse construction process, we describe a multidimensional meta-model and specify a set of transformations from a UML meta-model which is mapped to a multidimensional  ...  They propose an approach for the model driven development of these DW in which the secure conceptual DW data model, the PIM, is transformed into a secure XML DW, as a PSM, by applying a set of transformation  ... 
doi:10.3991/ijoe.v15i12.10720 fatcat:svczcspeonaltj2syfg5dxdbwu

An Integrated Conceptual Model for Temporal Data Warehouse Security

Marwa Salah Farhan, Mohamed E. Marie, Laila M. El-Fangary, Yehia K. Helmy
2011 Computer and Information Science  
It is vitally important to consider security requirements from the earliest stages of the development process.  ...  In the past few years, several conceptual approaches have been proposed for the specification of the main multidimensional (MD) properties of the data warehouse (DW) repository.  ...  We shall implement the extended CMTDWS to some commercial tools in order to elicit security requirement for DWs at the business level and we shall accomplish this with the MDA in order to cover the whole  ... 
doi:10.5539/cis.v4n4p46 fatcat:wnkvx34nzvbrdnk5iphkyvbrni

Dynamic Classification of Sensitivity Levels of Datawarehouse Based on User Profiles

Amina El ouazzani, Nouria Harbi, Hassan Badir
2016 International Journal of Database Management Systems  
Hence the importance of implementing security measures which guarantee the data confidentiality by establishing an access control policy.  ...  In this article, we will present our approach that allows first to exploit the permissions defined in the data sources in order to help the administrator to define access permissions to the data warehouse  ...  An MDA architecture for an automatic secure conception of a DW is applied in [14, 13] , but the two approaches were unable to understand the safety rules that are complex. • Although the permissions present  ... 
doi:10.5121/ijdms.2016.8602 fatcat:du5dvfwynvcrnjhcncx2jfqvs4

Developing secure data warehouses with a UML extension

Eduardo Fernández-Medina, Juan Trujillo, Rodolfo Villarroel, Mario Piattini
2007 Information Systems  
Considering the extreme importance of the information managed by these kinds of applications, it is essential to specify security measures from the early stages of the DW design in the MD modeling process  ...  Nevertheless, none of these proposals considers security issues as an important element in its model, so they do not allow us to specify confidentiality constraints to be enforced by the applications that  ...  We would also like to thank the reviewers for their valuable comments, which have helped us improve this paper.  ... 
doi:10.1016/j.is.2006.07.003 fatcat:rqjtshxrf5ddxijqu3e67mcidu

A case study on model driven data integration for data centric software development

Hyeonsook Kim, Ying Zhang, Samia Oussena, Tony Clark
2009 Proceeding of the ACM first international workshop on Data-intensive software management and mining - DSMM '09  
In this case study we collect and integrate historical data from various universities into the Data Warehouse system in order to develop student intervention services through data mining.  ...  This paper introduces a case study to adopt MDA technology as an MDDI framework for data centric software development; including data merging and data customization for data mining.  ...  In [6] , MD2A (Multi Dimensional Model Driven Architecture) is suggested as an approach for applying the MDA framework to one of the stages of the DW development: multidimensional (MD) modeling.  ... 
doi:10.1145/1651309.1651311 dblp:conf/cikm/KimZOC09 fatcat:2l4muwc5jbfshf4fetrwjn4ipm

MDA Approach for Designing and Developing Data Warehouses: A Systematic Review & Proposal

Mohamed Hanine, Mohamed Lachgar, Sara Elmahfoudi, Omar Boutkhoum
2021 International Journal of Online and Biomedical Engineering (iJOE)  
In this context, several approaches have been developed to design and implement data warehouses.  ...  Moreover, this approach aims to automate the process of software engineering, thereby decreasing the cost of software development and enhancing its productivity.  ...  DWEM from REM implemented in QVT ─ M2T transformation: it deploys the code generated In the article [6] , the authors presented an MDA approach for the development of DWs, they applied the transformations  ... 
doi:10.3991/ijoe.v17i10.24667 doaj:6c9aeabbe9e64e089723553043d021d0 fatcat:vhyk5fovf5fzlgnf26ydsi4kri
« Previous Showing results 1 — 15 out of 287 results